Question

In: Computer Science

My employer has me creating a system and tasked me to select network and access security...

My employer has me creating a system and tasked me to select network and access security controls. I need suggestions and real life examples on which network security controls that I should use and some access control technology for my company which is a local electric company outside of Jackson, MS.

Solutions

Expert Solution

First of all, it is very important to implement network security in order to secure your infrastructure from cyber security threats and risks prevailing over your infrastructure. You need to implement power cyber security so to keep away attackers from attacking your infrastructure. So, here are basic network level security:

  • Firewalls: Firewalls are the basic and most important level of security in your infrastructure. This will block all the unwanted traffics entering into your network and only allow those traffics which are trusted or are written in the allow rules. You can implement firewall both on the network device level as well as on the individual devices.
  • Encryption: Use of encryption in your network will provide huge security to all the data present in your infrastructure. Using encryption tool to encrypt your data will make it difficult for attackers to decode the actual data and thus it will surely make your infrastructure more strong.
  • Multi-Factor Authentication: This is another real-life security that helps in the security process of the network. This multi-factor authentication will authenticate the user to login into the system. This authentication procedure requires authorization based on password or mobile OTP.

These 3 real-life examples will certainly help in providing security to your infrastructure.


Related Solutions

Your company is tasked with creating software for a home security system.
1. Consider the following:Your company is tasked with creating software for a home security system. The software helps manage all the security cameras and devices installed in the house, relays communications between all parties, and provides a “dashboard” mechanism for homeowners and security personnel to access and monitor.Develop 8 to 10 requirements concerning this scenario.2. What is a “recommendation system” and how can it assist in requirements engineering? What tools can be used to assist in requirements gathering?
I am creating a system for a security design and need to choose controls for network...
I am creating a system for a security design and need to choose controls for network security and those with access controls as well. I need to decide what major network security controls I would need to recommend. Which ones are good examples and why? Within that, I need to describe three access control techs. and their essentials for util. apps. Are there a few cases to assist in demonstrating those access control techs.
For Network Access Control and Cloud Security You are required to research and report on this...
For Network Access Control and Cloud Security You are required to research and report on this topic according to the Detail of Question below. A. Select one paper to: Read, understand in order to present three main parts: 1. Summary: o Provide a 200-300 word summary of the paper under review, from the background to the results being presented, and further work proposed. Please do NOT copy the abstract into this space! 2. Main points: o The main issues as...
Network and Security discussion topics: Business Continuity 1. What are the benefits of creating a disaster...
Network and Security discussion topics: Business Continuity 1. What are the benefits of creating a disaster recovery plan? 2. Why is it important to preserve the chain of custody?
Social security system is funded by contributions from both the employee and employer
Social security system is funded by contributions from both the employee and employer
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has...
Case: Northridge Security Consultants, a security consulting company that specializes in network security for businesses, has been using you as an outside contractor to provide research and customer service for their clients. A landscaping business, Sunset Landscapers, has contracted with NSC to help them implement cryptography to protect all documents and transmissions throughout their network. They have over twenty locations nationwide. NSC has found that even though the company would like this technology, the IT Director is resistant to any...
Investments Assume you have been tasked with pricing a security. Select a pricing model, which can...
Investments Assume you have been tasked with pricing a security. Select a pricing model, which can be CAPM itself or any multifactor specification, including the Fama French version. Defend your choice of pricing model. If you are specifying a multifactor model, explicitly state the risk factors you would include (e.g., GDP changes, energy prices, etc.)Assume you have been tasked with pricing a security. Select a pricing model, which can be CAPM itself or any multifactor specification, including the Fama French...
Explain how designing an access control standard relates to system security practices.
Explain how designing an access control standard relates to system security practices.
A security administrator has been tasked with plementing controls that meet management goals
A security administrator has been tasked with plementing controls that meet management goals Drag and drop the appropriate control used to accomplish the account management goal Options may be used once or not at all. Easily diferentiate between mobile devices and servers in reports Enforce password complexity requirements Determine if devices used by terminated employees are returned Identity which employees have access to sensitive file shares 
You have been tasked with reconfiguring the network for your company, which has grown considerably over...
You have been tasked with reconfiguring the network for your company, which has grown considerably over the past year. You have used only static routing in the past, but you do not wish to spend the administrative time required to maintain the routing tables now that the network has grown. You have recently experienced numerous inaccuracies in the routing table caused by entries you made when in a hurry. Criteria for the reconfiguration includes the following: You would like to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT